Help - Search - Members - Calendar
Full Version: 'monkey or Tarantula Help me
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2
jmecha
If you were a hacker, would thier be a down side to having pockets full of comlinks, each comlink being full of agents and what not?

The reason I ask is because I know about jack and shit about the matrix despite rereading that chapter a few times, and I am sincerely curious if this multiple comlinks full of agents idea is any good.

I sort of think of each of thoose comlinks as truck loads full of S.C.U.D. vending machines, when you need help in the matrix, just keep calling on disposable assassions until the job is done.

Please anyone with an answer please chime in.
Tarantula
And their purpose would be to do what? Define "full of agents", what you're trying to do with it. If you're using it to exploit the (arguably) broken teamwork exploit tests, then sure, it'll work, but its debatable on whether thats allowed or not. If you're using it to exploit the agents only cause load on their home commlink, then again, it'll probably work, but its cheezy as hell. Honestly, imo, if you can run a few dozen agents on commlinks and have them do something useful by connecting to a central node, then goodbye hacking, because the corps will do that too, but their resources are more numerous. (I.E. next time you're hacking, the node you're in has a few dozen IC analyzing it a few dozen times per pass, since you have your few dozen agents, I merely consider it escalation, if it works, then everyone will be doing it.)
Buster
Aren't there penalties for running too many programs on the same node? That would limit the effectiveness of hordes of agents (and hordes of hackers too for that matter). In fact, the rating of the agent itself should reduce the effectiveness of the node too (but I don't know if that's RAW).
jmecha
huh?
Buster
QUOTE (jmecha @ Jul 27 2007, 10:14 PM)
huh?

p. 213. System (Software)
Tarantula
Thats the arguement. If I am a hacker, and I'm hacking your metalink running vector xim OS. (Res 1, Sig 2, Fire 1, Sys 1). But I'm running off my commlink thats 6, 6, 6, 6. Running 5 rating 6 programs. Why don't my programs get limited by your commlink that I'm hacking? Because I'm not running them on your commlink. I'm merely connected to it, but they are running on MY commlink. Thusly, I can have each agent running on his own commlink, and hack his own way into yours, and each can do things to your commlink with the same freedom hackers get. They're running on their home commlink, and are merely connected to yours. Thats why its broken.
jmecha
So...if the comlink, node or whatever the matrix device maybe in this example had a system of 6....it could only hold (System x 2) 6 subscribers.......so only six hackers could fight over one comlink and or node at once simple because there is no room for additional combatants.

So because of this limitation, there are not countless IC inside of every node?
Tarantula
No, then everynode just subscribes to the nearest 12 office supplies. Stapler, printer, keyboard, etc etc. And hacking is utterly useless. Again, because you can't connect because its overwhelmed.

The way around this is to argue it this way. Corp Node A has system of 3 (for a max of 2x3=6) 6 subscribers. It subscribes a matrix connection 1, 4 IC nodes, and 1 Corp Node B.

I want to hack it, a successful hacking attempt subscribes Node A to my commlink (System 6). Subscriptions don't have to be two way, so I subscribe it to me, and I can now go about my way pwning it.

Thusly, the IC subscribe the node they're protecting to themselves, so they can access it . And you get infinite IC/agents again.

You either get no connections cause they're full, or infinite agents/IC/personas. Which is it?
Ravor
Basically there are two different view on how Agents work, in one view yes, you can run an Agent using Node A's resources but have that Agent present and operating on Node B. In which case you have to ask questions like why doesn't every corp have node after node whoes only purpose is to run IC on the rest of the system.

The other view which I happen to share is that Agents have to use the resources of the node they are present on in which case nodes aren't going to be running hoards of IC because of the Responce drop. However then you have to ask how does Exploiting work, well personally I figure that the Agent gets to use Node A's resources while hacking into Node B but once in Node B then they have to use Node B's resources.

Deckers don't have this limitation because ... well ... they have a persona and Agents don't, or something to that effect.

As for using the hoards of Agents to be a super Decker, well, that's been hashed over so many times that I just suggest running a search on the topic.
Tarantula
I never really looked into agents much because of all the babble about the super smith hoard. Now, looking, I've found this line.
"Agents use the Response attribute of whatever node they are run on; this means that the attributes of an agent operating independently may vary as it moves from node to node."SR4, 227.

A lot can be taken from this line. 1) That agents are run on whatever node they are currently accessing (unless piggybacking as an active program on a deckers persona). 2) This means they count as an active program (as well as their active programs) against that node. 3) Therefore, the agent hoard is only good for bombarding IC nodes with, as the sudden appearance of so many programs will almost immediately halt the system through response degredation.

Therefore, agent hoards are good for many different tasks at once, or for halting systems through resource hogging. Other than that, they're pathetic and expensive.
jmecha
So in short...there is no real explination and or rule currently on print that explains why or even states why this is not possible, but it is generally accepted amoungst the Dumpshock communuity here that giant swarms on swarms of PC Agents vs Corp Hackers and what not is just ridiculous and sort of game breaking.

right or wrong?
Tarantula
Actually, though the rule is vague, it does state that agents RUN on the node they are operating in. Unless they are operating as a program of a persona. THusly, there is a rule that explains why it isn't possible, because going past 1 (decent agent) or 2 (pathetic agents) even the best systems start becoming worthless, and quickly.
Ravor
Welcome to the Martix 2.0, just pray to the Spirits that it actually gets fixed in Unwired.
Buster
I never played a hacker, but my understanding was that the hacker's persona is running on his commlink and the agent's persona is running on the node. The agent is free roaming and is essentially re-spawned on each node it exists on. The hacker's persona can only be spawned from his commlink.

Am I not misinformed? Was I not informed correctly?
Buster
And that would explain the difference between IC and an agent. IC is a network appliance that spawns it's persona somewhere on the system (like a hacker) and can roam the entire system without degrading each node it is on. This is why you would be smarter to run IC to protect your commlink instead of an agent.
Tarantula
Yes buster. Thats roughly correct, however if a hacker is running the agent on his persona, then its always running on the hackers home node, much as any of the hackers other programs are. If the agent is free roaming, it is respawned on each node independently.
Buster
I didn't think an agent could be run on a persona, it had to be run on a node. When an agent is running on the hacker's commlink, it's only protecting/affecting his commlink node, not the node the hacker's persona is currently playing around in. Hence my IC/Agent post I made a second before your post.
Fortune
QUOTE (Buster)
This is why you would be smarter to run IC to protect your commlink instead of an agent.

What, exactly, is the difference? And how would one go about converting an Agent into IC?
Tarantula
"Agents can be loaded into your persona like other programs (taking a Complex Action), allowing the agent to accompany you to any nodes you access."SR4, 227.
They can.
Buster
The difference is the sentence right before the sentence you quoted. And you don't "convert" Agents to IC anymore you can convert Pilots to Agents.
Tarantula
Fortune: Agents are IC, and IC are agents. IC is just the moniker for corps defensive agents. Hackers and spiders are much the same, except their real people. Difference is the name, not the abilities.

Buster: Persona's use their home commlinks ratings to run. Thusly, an agent running on your persona still uses your home commlinks response. However, the agent himself is a program, plus any other programs you want him to run, plus the ones you want yourself to run, and its already almost worthless anyway.
Ravor
Reading the description of IC, they are basically Agents with a certain program loadout, a legacy term so to speak.

Unless Unwired changes things of course.
Fortune
Then how would the Hacker go about acquiring/programming the IC (I still see no mechanical difference between the two) that you suggest he use on his Commlink instead of Agents?
Buster
QUOTE (Tarantula)
"Agents can be loaded into your persona like other programs (taking a Complex Action), allowing the agent to accompany you to any nodes you access."SR4, 227.
They can.

Hmmm, that confuses the hell out of me then. Doesn't that mean that a node is NEVER degraded? If neither IC, agents, or hackers degrade a node with their programs, then what is the rule for? The rule must just be for commlinks and one spawn server on the system? So a company can save a ton of money by buying one high-system server that spawns all its IC/agents and all other nodes have System 1?
Fortune
QUOTE (Tarantula)
Fortune: Agents are IC, and IC are agents. IC is just the moniker for corps defensive agents. Hackers and spiders are much the same, except their real people. Difference is the name, not the abilities.

That's what I've always thought, but people keep telling me they are different ... without actually explaining that difference.
Buster
QUOTE (Tarantula)
Buster: Persona's use their home commlinks ratings to run. Thusly, an agent running on your persona still uses your home commlinks response. However, the agent himself is a program, plus any other programs you want him to run, plus the ones you want yourself to run, and its already almost worthless anyway.

So the OP is right, you can have hundreds of agents running on a few commlinks in your pockets and destroy any system you unleash your horde on without ever degrading it?
Tarantula
Hmm? I'm saying that if a hacker runs the agent/ic as one of his persona programs, the agent/ic is operating on the hackers home node, the same as the hackers persona is. The detriment to this, is that agents are already system hungry, and if the hacker wants to run his own programs as well, he's going to find himself overwhelmed already anyway.

Examples. Assuming a home node of 3, 3, 3, 3. And a target node of 2, 2, 2,2.
1) No agent. Hacker is running 3 programs, exploit, analyze, and attack. He hacks into the target node, goes about his plan, probably just attacking IC.
2) Agent on persona. Hacker is running 5 programs. Exploit, stealth, medic, agent (attack). Everythings running at 2 due to degradated response. Hacker can hack in, have the agent do his fighting, and run the medic program on the agent to keep him in repairs.
3) Agent stand alone. Hacker runs 3 programs. Exploit, stealth, medic.
Agent runs 2 programs (Exploit, attack). The agent hacks in first, and the hacker follows (to avoid response issues of them both active at the same time. When in the target node, hackers programs continue operating at 3, agents drop to 1 (3 programs running, response on target node goes from 2 to 1, limitting everything to 1).
Ravor
Exactly, they only time that an Agent gets to use Node A's resources while in Node B is when it is loaded into the persona of a Decker who is also in Node B, and as Tarantula has pointed out, loading Agents on your persona isn't usually an effective tactic.

Fortune, you aquire an Agent, load it with programs and call it IC, they are one and the same at least until Unwired.
Tarantula
To clarify some more. I see 2 methods of operation for IC. (I'll stick to calling them IC from now on, since its easier to type.) They can either run independantly, or on a persona.

Independantly:
IC use the response rating of the node they are running in(i.e. where their persona is located in). To access nodes they must have passcodes or utilize an exploit program. They are treated as a persona running in the node they are in. Response degredation affects all programs in the node they are running in(including IC and programs the system is running).

In a persona:
They are treated as a program the persona is running, affecting the node the persona is running from (i.e. what you're datajacked into). Personas can move from node to node while utilizing their home nodes attributes. By running off a persona IC inherit this (since they are running in the node the persona is running off of, which is the home node). However, this can easily lead to response degredation of the home node, affecting both the hacker and the IC, however, the node they are connected to is not inhibited in any way.
Buster
QUOTE (p227)
Agents can also access other nodes independently
if instructed to and if they either have the passcodes or
are carrying an Exploit program and can hack their own way in
(as independent icons).


QUOTE (p228)
If you wish for your agent to operate in the Matrix independently,
you must load it on a particular node separate from your
persona. The agent will continue to operate in the Matrix even if
your persona goes offline. In this case, the agent doesn’t count toward
your persona’s active program limits like running programs
do, but it does count as a subscriber toward your subscription
limit


Sounds like you don't need to spawn ("load") your agents from your commlink at all. It sounds like you can spawn your agent on any other node (including pocketfuls of commlinks and nodes within the network you're hacking into) and the agent uses THAT spawn node for degradation purposes. You or your agent are never limited by the node you are attacking/visiting/playing in. Nodes that you are working in NEVER degrade. ONLY nodes you or your agent spawn from degrade.

Therefore, pocketfuls of commlinks filled with hundreds of agents can all be unleashed on a network at the same time and slaughter everything inside without ever degrading the target network nodes at all.

Am I wrong anywhere above? Should I head to the nearest commlink store and fill my van so I can take over the world?
Ravor
No, it doesn't work. The only way you can use Node A's resources to run an Agent on Node B is for a Decker to load the Agent onto her persona and then hack into Node B. (Which quite frankly is usually bad for the Decker given that she is also running all of her programs on Node A.)

Independent Agents don't get to use that little trick and are running on the resources of whichever node they happen to be in at any given time.
Buster
Thank you, that's exactly what I said in my very first post on this thread, but I was contradicted.
Tarantula
Well, you also included hackers in that. Hoards of hackers are very effective, agents, not so much.
Ravor
I don't know, in my campaigns the first responce to a blizt attack by hoards of Deckers would be a system shutdown, which isn't really that useful unless you were willing to risk dumpshock to make the system reboot.
Tarantula
Problem is, if theres 50 deckers, doing a teamwork exploit, then 49 of them add dice to the 50ths pool, who makes his attempt. If the system doesn't see him, it doesn't know anything else happened. He can then go in, and edit accounts to grant access to the other 50 deckers.
Ravor
Sure, and as long as they remain sneaky then everything is fine, but if they start trying to blizt the system like I've seen people try to do, they are going to be found out and dumpshocked as the system reboots.

Besides, unless I've missed something, wouldn't you be limited to ( System x 2 ) Deckers helping you on the exploit roll? Might not be RAW, but I know I'd rule that in order to make a teamwork test then everyone had be be subscribed to everyone else.
Fortune
QUOTE (Ravor)
No, it doesn't work. The only way you can use Node A's resources to run an Agent on Node B is for a Decker to load the Agent onto her persona and then hack into Node B. (Which quite frankly is usually bad for the Decker given that she is also running all of her programs on Node A.)

Independent Agents don't get to use that little trick and are running on the resources of whichever node they happen to be in at any given time.

Then what was meant by the statement about IC* not degrading the system they were running on, and therefore be more useful for Commlink defense? Does IC degrade its host system (or indeed the node it is running on and/or affecting), or does it get a 'free pass'?

*Yes, I do know that Agents and IC are the same thing. smile.gif
Ravor
Unless I mispoke I don't believe I've ever said that, but if I did then I was wrong. cyber.gif

*Thinks for a bit*

I have said that there is a section of Dumpshockers who believe that you can use Agents that way, but I think they are mistaken.
knasser
QUOTE (Ravor)
Basically there are two different view on how Agents work, in one view yes, you can run an Agent using Node A's resources but have that Agent present and operating on Node B. In which case you have to ask questions like why doesn't every corp have node after node whoes only purpose is to run IC on the rest of the system.


I'm of view agents can be run on Node A and be present in Node B (but then you knew that, Ravor).

There are two issues around this view. The first is why I think that and the second is how I make that balanced.

My reasons for thinking this are as follows:

My initial reading of the wordig of the RAW suggested it and repeated readings appear to allow it by making distinctions for running agents on other nodes and because of how you can carry agents with you

It makes sense that if the software running a persona operates on your own hardware (commlink, terminal, whatever) whilst you travel from Node to Node, then there is no reason why an agent cannot do the same. After all, they can interpret the same data that your persona does, transmitting and receiving the same signals. I'm hard put to find a solid reason why an agent could not do this in any setting where a matrix user's persona could do this.

The fact that agents can explicitly accompany your persona whilst running on your own commlink certainly shows that in principle it works.

There is nothing in the rules that prevents an agent from operating in multiple nodes. Doing this in combination with forcing agents to run on the node they are visiting will cause your 4th Edition rule book to weep blood. Which while good for freaking people out, makes the pages all gummy and hard to turn.

If this is forbidden, then it makes roving IC, as suggested in the rule book problematic as you essentially have a wandering performance hit on your office systems and a wily hacker can jump the IC whilst it's inspecting the Response 1 toilet paper ordering sub-system.

My considerations on the implications in game are as follows:

It is acceptable to have the corp system have an "IC Node" from which IC runs and I occasionally use this in some of the systems that I have done. However, there are disadvantages. If you have any sort of network or subscription problem, say someone turns on a jammer in your wireless office, your security on the node their supposed to be protecting vanishes with a scream of static. But there are more types of network problem than deliberate on-site sabotage. It's a risk. It requires more expense in setting up a second system somewhere on which to run the IC. It creates a single point of vulnerability if this approach is used generally, whereby a hacker with a modicum of inside knowledge can knock out IC across the system. And if you have any sort of system problems, say you need to restart nodes, then without the security software actually being on the system it's supposed to be protecting, you can find yourself suddenly without protection.

Now these are not show-stoppers. As I've said, I use this approach some times. But if you don't need to do this, then why would you take the additional risks and costs? For many scenarios, making sure that the node you want to protect has the capability to run its own security software is the better and cheaper option. Basically, the GM has lots of justification for not taking this approach and if you do take this approach it introduces some new tactical options for hackers in your game, which is a good thing.

On the subject of Agent Swarmsp

There are two points to consider here. One is to consider the effect of an agent swarm on the victim. Firstly, with every additional agent, you decrease your chances of escaping undetected. Remember that every single one of those is a potential clue to who is out there hacking the network. If one is discovered, that's generally a bad thing when you're dealing with parties much richer and more powerful than yourself. Secondly, much information only has value so long as the person you took it from doesn't know that you have it. The agent swarm approach for this is worse than going solo. Thirdly, and probably most importantly, there are super-methods that corps can use to deal with intruders, which they are far more likely to use in the case of mass agent attacks. You can reboot nodes, sever connections and even shut-down for the afternoon whilst Renraku sub-contractors go through Matrix logs and find where all these data trails led back to. You'll be very, very pissed, but in the face of such a massive and well-funded attempt to get some information, it's a plausible response. In any case, the hacker returns home with nothing to show for it, but having tipped off the opposition.

The other point to consider is the expense of using agent swarms. It's a non-trivial expense for hackers and for the corporate world, which it was suggested would have them all over the place, it's a woeful waste of resources. The reason is because the aggressor can choose the point of attack. The corp is in the nature of defending the land and requires (in principle) vaster numbers of soldiers to defend that terrain. Far better to have good scouts travelling the land, who can signal the elite cavalry as needed.
Ravor
Sure, and I don't think you are alone in that view, but I try not to drop names. silly.gif
Tarantula
1) why do you need your IC checking the response 1 toilet paper ordering? IC Should check checkpoints in and out of the systems, and critical system data. Anything else should be giving an analyze program, and told to shutdown access if it finds anything.
2) If your IC is running of a corp IC node, then whats to stop the hacker from hacking admin access on any server, and telling it to cut the connection to the IC node? Easy peasy way to shut out all their mean nasty IC.
3) If IC can run on an IC node, whats to keep a well funded corp from buying 50-100 such nodes, and paying their own programmers to make the IC to run on those? Then, you have 50-100 IC sitting in the access system analyzing it 15-30 times per second. No matter what, any decker, or technomancer will be caught out by this eventually. Your letting agents/ic run on a separate node = unhackable systems. Especially if the corp can pay programmers to make one kind of IC, then use that software a few hundred times.
4) Agent swarms, firstly, on the initial hack in, agent swarms use a teamwork test to exploit admin access for one of them. That one edits in valid admin accounts for all the rest and itself, then relogs in as a valid administrator. They then edit off all other accounts, resulting in the only valid users being the agents themselves, deleting all logs and then the only recourse the corp has is to physically pull the power. Considering that probably takes a good deal longer than the agents need to dot heir work, mission accomplished. So, they don't know what you took, they only know somehow they all got booted off, the server doesn't reboot because it never knew they weren't allowed in. And they cant go through logs because there are none. You want to set the corp back big time, have the agents wipe all data once they have what they want. Maybe the corp things the run was just to set them back, not steal what they were developing. They can't trace you down, since theres no logs, and the hacker has paydata, and an agentswarm to relax with.
The other point, is it IS a trivial expense for the corporate world, and hackers. Hackers merely need to break copy protection on the progs the agent needs to run, and on the agent itself. Then its a matter of making all the commlinks for them to run off of. And corps can merely fund heir own IC programming, for free distribution on every node with good enough stats to house an IC. Figure, every linked office supply has a standard rating of 3. Thats enough for an IC with attack and analyze. Thats all you really need. The corp is able to field a number of "soldiers" as you called them in the hundreds easily (using standard devices each to house an IC). Attackers are in the 1-3 unless using an agent swarm, in which case, the attackers are at a disadvantage since they can't write off all their commlinks as a tax deductable business expense. (If the business even pays taxes.
Fortune
QUOTE (Ravor)
Unless I mispoke I don't believe I've ever said that ...

I didn't mean to imply that you said it, although upon looking at my post again I can understand it being taken that way. It was Buster that said ...

QUOTE (Buster)
And that would explain the difference between IC and an agent. IC is a network appliance that spawns it's persona somewhere on the system (like a hacker) and can roam the entire system without degrading each node it is on. This is why you would be smarter to run IC to protect your commlink instead of an agent.
Tarantula
Gah. I completely had missed that. For clarification one more time. IC and agents are the same, and work the same. They're different names, like hackers and spiders.
knasser
QUOTE (Tarantula)
1) why do you need your IC checking the response 1 toilet paper ordering? IC Should check checkpoints in and out of the systems, and critical system data. Anything else should be giving an analyze program, and told to shutdown access if it finds anything.



The toilet paper node was a humerous example of the principle that the effectiveness of your IC will vary wildly if you ruled that it could not run on a remote node. This is a weakness because it gives an intruding hacker an advantage she can exploit. As regards checkpoints, I don't design systems that are dependent on this principle because it leaves you wide open to internal betrayal, physical intrusions (human or micro-drone) and even limits your options in terms of granting access to discrete sections of your system. Customers may have access to the "customer zone." Is that located inside or outside of your checkpoint system? Problems either way. Your first response will likely be "have multiple check points." That is what having IC distributed through your system is. I do use checkpoints (you can look at my example matrix sites document on my site, if you wish), but there are good reasons for having IC elsewhere and for having it roaming.

QUOTE (Tarantula)

2) If your IC is running of a corp IC node, then whats to stop the hacker from hacking admin access on any server, and telling it to cut the connection to the IC node?  Easy peasy way to shut out all their mean nasty IC. 


Other than the difficulty of getting Admin access, not much. I have already listed a couple of actions that can be taken to sever the remote IC and suggested that there were others such as this (along with other negatives). The way that you phrase this point makes me think you are arguing with my position that remote IC is the way to do things. You have imagined that position. I said that I use this technique some times, mainly for roving IC. It is one part of a security solution that a GM can use. And it's good to introduce more tactical options like this from the point of view of the game.

QUOTE (Tarantula)

3) If IC can run on an IC node, whats to keep a well funded corp from buying 50-100 such nodes, and paying their own programmers to make the IC to run on those?  Then, you have 50-100 IC sitting in the access system analyzing it 15-30 times per second.  No matter what, any decker, or technomancer will be caught out by this eventually.  Your letting agents/ic run on a separate node = unhackable systems.  Especially if the corp can pay programmers to make one kind of IC, then use that software a few hundred times. 


There are a couple of things in there. Firstly, 50-100 nodes all running IC is going to cost a lot of money, and that is wasteful. I can make systems with a fraction of that resource that are close to unhackable for anyone but the very experienced and well-funded hacker. Please don't make the mistake of thinking that every corp is Evo's head office, or a lab guarding hyper-advanced technology. For the majority of companies, plowing vastly more than is necessary into security costs is bad management.

Secondly, there is the realism aspect. Although the rules don't forbid it, many things break down if you take them to extremes, I think many GMs, myself included, would think that have 100 agents inspecting every persona that logged on in a single node would be problematic. I would guess that it would require greater infrastructure to handle, by that point.

Also, realistically, the majority of corps aren't going to pay a programmer to write an agent program and then replicate it 100 times. Leaving aside any GM judgements on whether a successful exploit against one type of program has knock on effects on an identical copy of that program, there are serious issues to consider. In order to support the 'write once, use infinite' cost saving technique, we've got to be talking about all the software that is necessary. So it's not just the IC, but at the minimum Analyze programs as well. So you have people spend a year writing this software. Who maintains it as exploits are discovered, who updates it as technology moves on? Who supports it when there are problems, what happens when you're programmer moves on to other projects of companies? Who will you pass the buck to when you have a security failure and the shareholders are baying at your heals? There are good solid reasons why a manager picks up the commlink and calls Renraku Matrix Security division for their Small Corp package deal.

Having worked in project management, I can tell you that the last thing you want to be doing when you run a small land-trading corporation is fiddling around with managing your in-house software development.

QUOTE (Tarantula)

4) Agent swarms, firstly, on the initial hack in, agent swarms use a teamwork test to exploit admin access for one of them.


Well I felt that I addressed this, but you obviously don't, so I'll expand. If you use an agent swarm, there are two issues. Firstly, as a GM, I might have an issue with identical pieces of software being able to contribute meaninfully to a teamwork test. It's not like lots of people pusing on a door at the same time, it's like looking the same information up in ten different copies of a dictionary. They all hold the same ideas and information. But if you want a concrete RAW problem with agent swarms, and what I brought up last time, there is the statistical inevitability that if you use a swarm, then you will be noticed. I think you are suggesting that all these agents can support a primary hacker somehow, without actually participating in the hack itself and thus exposing themselves. I don't think that's supportable in either rules of fluff.

And once noticed, there are some really hard-hitting options that the defending node can take to deal with you. It's one of the few things that Ravor and I agree on, so it must be true. wink.gif smile.gif I've already given a solid list of reasons why it's important to remain undetected in my previous post. I wont repeat them here unless you think that remaining undetected is not important.

QUOTE (Tarantula)

Considering that probably takes a good deal longer than the agents need to dot heir work, mission accomplished.  So, they don't know what you took, they only know somehow they all got booted off, the server doesn't reboot because it never knew they weren't allowed in.  And they cant go through logs because there are none.  You want to set the corp back big time, have the agents wipe all data once they have what they want.  Maybe the corp things the run was just to set them back, not steal what they were developing.  They can't trace you down, since theres no logs, and the hacker has paydata, and an agentswarm to relax with. 


Your time scales are off. The rules for rebooting nodes (if that's the approach you wanted to take) are on pg. 223 of the BBB. It can be done in a couple of combat turns, started during the initial agent swarm's exploit test (and would be), and unless the agent's are starting off hacking the Vital Data Node, which in any system I designed, they would not be, then all they're going to do is get three seconds playing around in a checkpoint node if they're lucky.

As to logs and datatrails, you realise that each agent must spoof the data trail separately? And that each data trail can be tracked separately for a chance to succeed?
Fortune
I'd love to see an example of what you consider to be a 'very secure' Commlink, knasser.
knasser
QUOTE (Fortune)
I'd love to see an example of what you consider to be a 'very secure' Commlink, knasser.


Well, I was talking about corporate systems in general. Commlinks are much harder to secure. This doesn't really relate to what I was saying, but as you asked for one, the following is pretty good, I think.

QUOTE

Very Secure Commlink:

Base Model: Hermes Ikon.
Response Upgrade: Response 6.

System: 6
Firewall: 6

Software: Analyse: 5, Data Bomb 5

IC#1: Pilot 5, Analyse 5.
IC#2: Pilot 5, Analyse 5.


This should stand up to most attacks. A professional hacker, with veteran skills (4) and above average programs (4), will be detected most of the time:

Average 3 turns to hack on the fly. Average 1.3 turns for node to notice intruder (round up to 2). If the hacker isn't noticed on turn 2, then she will almost certainly be noticed on round three when she finally gets enough successes to gain public level access. I think almost certainly, it would be set to require security level access to get in, though. Some people don't make use of the access level rules in this way, so I leave the example as it is, but in, I think, most people's games, the odds of getting in undetected would be even shorter. This will also boost things up the level where elite hackers with top-grade programs routinely get noticed.

The response on noticing an attacker is customisable, but I would recommend turning off wireless connectivity. If the intruder actually gets inside, this will definitely be the response. Possibly causing dumpshock.

The reason for first considering Hacking on the Fly is that with a commlink, there are many reasons why it will be difficult to sit there hacking it for six or seven hours. It will go into and out of wireless areas, be turned on or off, perhaps. connect to systems that have their own security systems which watch for rogue connections (I think that as the system is all sixes, it's reasonable to make assumptions about the owner's lifestyle and job). At any rate, allowing a hacker to probe a wandering commlink for that length of time is definitely at the whim of the GM. Allowing it though, we get the hacker gaining access in about six hours, with the commlink getting a 50:50 chance of detecting the intrusion attempt.

So far, security has been pretty good, though obviously a concerted attack can get in. Any persona that does get in, will be subjected to detection attempts by the IC. Each of them has around a 65% chance of detecting the intruder (ties go in the hacker's favour because net hits are required on the perception roll). Cumulatively, that leaves the hacker only a 20% chance of going unnoticed. 10% if you factor in the chance of being unnoticed on gaining entrance, which you should.

So by this point, 9/10 hackers have been noticed and the commlink turns off wireless activity whilst Mr. Powerful Executive is alerted. Swtiching modes is a Free Action, so this ought to include severing wireless connections. Bang - hack over.

For those hackers that are in undetected and want to try and get data from the commlink, but this requires dealing with the Data Bomb. They'll have to detect it first. That's likely, because I elected to put a second IC program on there, rather than a Stealth program to hide the databomb. On reflection, it might have been better to do this and leave the system at 6 as well, but I can't be bothered re-working the example at this point. The hacker will have a 75% chance of detecting the bomb, followed by around a 45% chance of defusing it. In retrospect, it definitely would have been better to scrap the extra IC and beef up the databomb and stealth it. Oh well.

To summarise, in order to get any data from the commlink, the hacker must either:
Succeed at a long shot to hack on the fly, followed by chances of success of 10% followed by 75% followed by 45%

or if able to spend six or seven hours maintaining a connection to the commlink:

Succeed at 50% chance, followed by 20% followed by 75% followed by 45%. Total: 3% chance of professional, well-equipped hacker gaining access. I negelected to use hot sim, which improves all these odds, but we're still doing well.

As I said, I was talking about corporate networks, not commlinks. But as you asked for one, there you go. If you expand on the PAN, supplementing with another commlink which is wired to the first, then you can make things far more secure, but I don't like doing that because it's inelegant and doesn't suit the intent of the flavour or the rules.
Buster
QUOTE (Fortune @ Jul 28 2007, 03:32 AM)
QUOTE (Ravor @ Jul 28 2007, 03:33 PM)
Unless I mispoke I don't believe I've ever said that ...

I didn't mean to imply that you said it, although upon looking at my post again I can understand it being taken that way. It was Buster that said ...

QUOTE (Buster)
And that would explain the difference between IC and an agent. IC is a network appliance that spawns it's persona somewhere on the system (like a hacker) and can roam the entire system without degrading each node it is on. This is why you would be smarter to run IC to protect your commlink instead of an agent.

Don't hate me, blue margaritas make a guy say stupid things.
Tarantula
QUOTE (knasser)
QUOTE (Tarantula @ Jul 28 2007, 08:19 AM)
1) why do you need your IC checking the response 1 toilet paper ordering?  IC Should check checkpoints in and out of the systems, and critical system data.  Anything else should be giving an analyze program, and told to shutdown access if it finds anything.


The toilet paper node was a humerous example of the principle that the effectiveness of your IC will vary wildly if you ruled that it could not run on a remote node. This is a weakness because it gives an intruding hacker an advantage she can exploit. As regards checkpoints, I don't design systems that are dependent on this principle because it leaves you wide open to internal betrayal, physical intrusions (human or micro-drone) and even limits your options in terms of granting access to discrete sections of your system. Customers may have access to the "customer zone." Is that located inside or outside of your checkpoint system? Problems either way. Your first response will likely be "have multiple check points." That is what having IC distributed through your system is. I do use checkpoints (you can look at my example matrix sites document on my site, if you wish), but there are good reasons for having IC elsewhere and for having it roaming.

You're just as vulnerable to physical intrusions if you have roaming IC instead. All they have to do is cut the connections to the IC that roams. Unless the needed node has its own IC which it can run (1 or 2 at most) then its defenseless.
Customer zone would be the checkpoint. They're authorized users, so they aren't hassled. If they do something disallowed, the IC crashes them. Just don't give your IC blackout/hammer and you're good.
QUOTE (knasser)

QUOTE (Tarantula)

2) If your IC is running of a corp IC node, then whats to stop the hacker from hacking admin access on any server, and telling it to cut the connection to the IC node?  Easy peasy way to shut out all their mean nasty IC. 


Other than the difficulty of getting Admin access, not much. I have already listed a couple of actions that can be taken to sever the remote IC and suggested that there were others such as this (along with other negatives). The way that you phrase this point makes me think you are arguing with my position that remote IC is the way to do things. You have imagined that position. I said that I use this technique some times, mainly for roving IC. It is one part of a security solution that a GM can use. And it's good to introduce more tactical options like this from the point of view of the game.

Getting admin access isn't too terribly difficult. Remote IC IS the way to do things, if you make it a house rule. Theres a reason it doesn't work in RAW, and that is because then you can easily get a few dozen IC on any system with no impact to it. I'll reiterate, remote IC is not RAW.

QUOTE (knasser)
QUOTE (Tarantula)

3) If IC can run on an IC node, whats to keep a well funded corp from buying 50-100 such nodes, and paying their own programmers to make the IC to run on those?  Then, you have 50-100 IC sitting in the access system analyzing it 15-30 times per second.  No matter what, any decker, or technomancer will be caught out by this eventually.  Your letting agents/ic run on a separate node = unhackable systems.  Especially if the corp can pay programmers to make one kind of IC, then use that software a few hundred times. 


There are a couple of things in there. Firstly, 50-100 nodes all running IC is going to cost a lot of money, and that is wasteful. I can make systems with a fraction of that resource that are close to unhackable for anyone but the very experienced and well-funded hacker. Please don't make the mistake of thinking that every corp is Evo's head office, or a lab guarding hyper-advanced technology. For the majority of companies, plowing vastly more than is necessary into security costs is bad management.
Not really. Most anything with a wireless connection is rating 3. That means it can run a rating 3 IC, with attack and analyze. And there you go. Run a few hundred/thousand of those (Seriously, how many keyboards, monitors, printers, anything electronical are there in an office?) And have them all rove around the whole system even. No matter what, they'll be a few dozen in any given node.

QUOTE (knasser)
Secondly, there is the realism aspect. Although the rules don't forbid it, many things break down if you take them to extremes, I think many GMs, myself included, would think that have 100 agents inspecting every persona that logged on in a single node would be problematic. I would guess that it would require greater infrastructure to handle, by that point.

Realism aspect? You mean, like how its realistic for a program to cause a strain on the processor running it? Not on the one its data is housed on?

QUOTE (knasser)
Also, realistically, the majority of corps aren't going to pay a programmer to write an agent program and then replicate it 100 times. Leaving aside any GM judgements on whether a successful exploit against one type of program has knock on effects on an identical copy of that program, there are serious issues to consider. In order to support the 'write once, use infinite' cost saving technique, we've got to be talking about all the software that is necessary. So it's not just the IC, but at the minimum Analyze programs as well. So you have people spend a year writing this software. Who maintains it as exploits are discovered, who updates it as technology moves on? Who supports it when there are problems, what happens when you're programmer moves on to other projects of companies? Who will you pass the buck to when you have a security failure and the shareholders are baying at your heals? There are good solid reasons why a manager picks up the commlink and calls Renraku Matrix Security division for their Small Corp package deal.

Fine, its a shady corp, the buy one agent, and copy it a few hundred thousand times.

QUOTE (knasser)
Having worked in project management, I can tell you that the last thing you want to be doing when you run a small land-trading corporation is fiddling around with managing your in-house software development.

QUOTE (Tarantula)

4) Agent swarms, firstly, on the initial hack in, agent swarms use a teamwork test to exploit admin access for one of them.


Well I felt that I addressed this, but you obviously don't, so I'll expand. If you use an agent swarm, there are two issues. Firstly, as a GM, I might have an issue with identical pieces of software being able to contribute meaninfully to a teamwork test. It's not like lots of people pusing on a door at the same time, it's like looking the same information up in ten different copies of a dictionary. They all hold the same ideas and information. But if you want a concrete RAW problem with agent swarms, and what I brought up last time, there is the statistical inevitability that if you use a swarm, then you will be noticed. I think you are suggesting that all these agents can support a primary hacker somehow, without actually participating in the hack itself and thus exposing themselves. I don't think that's supportable in either rules of fluff.
Teamwork tests, all the agents - 1 make a teamwork test which gives a dicepool bonus to the one with the best dicepool. That ONE makes the actual exploit test, opposed by the firewall, and the system gets its analyze against it. Maybe theres code in the agents about different methods to utilize if there are multiple personas working on a single problem. You won't be noticed, because the first one gets in, and since hes likely to act before the system (since runners would have him be rating 6) then he can get in, edit in all the other agents as valid users, delete all log files, turn logs off, and turn ic and analyzing off. Before hes detected as an invalid user. Then he edits himself a valid account too, and relogs on though that. They move on to the next node. No detection.

QUOTE (knasser)
And once noticed, there are some really hard-hitting options that the defending node can take to deal with you. It's one of the few things that Ravor and I agree on, so it must be true. wink.gif smile.gif I've already given a solid list of reasons why it's important to remain undetected in my previous post. I wont repeat them here unless you think that remaining undetected is not important.
Yeah, like severing connections. That really hurts those agents it does.... Again, you're assuming you detect the agents. Theres only one you can analyze against to see them, and hes coming in with admin access in one go. His first action is command and turn off IC and the systems analyzing. Second, edit to delete logs. Third, edit to create admin accounts for all other agents and himself. Fourth, log in using his now valid admin account.

QUOTE (knasser)
QUOTE (Tarantula)

Considering that probably takes a good deal longer than the agents need to dot heir work, mission accomplished.  So, they don't know what you took, they only know somehow they all got booted off, the server doesn't reboot because it never knew they weren't allowed in.  And they cant go through logs because there are none.  You want to set the corp back big time, have the agents wipe all data once they have what they want.  Maybe the corp things the run was just to set them back, not steal what they were developing.  They can't trace you down, since theres no logs, and the hacker has paydata, and an agentswarm to relax with. 


Your time scales are off. The rules for rebooting nodes (if that's the approach you wanted to take) are on pg. 223 of the BBB. It can be done in a couple of combat turns, started during the initial agent swarm's exploit test (and would be), and unless the agent's are starting off hacking the Vital Data Node, which in any system I designed, they would not be, then all they're going to do is get three seconds playing around in a checkpoint node if they're lucky.

IF the node detects it, then yes, it can reboot and kick the agents off. If only corp security notices it because they suddenly can't log in, they have to run downstairs, and hit the physical switch, or hack their way back into their own server. Either way, the agents probably have enough time to take 2 combat turns per server to parade through the system.

QUOTE (knasser)
As to logs and datatrails, you realise that each agent must spoof the data trail separately? And that each data trail can be tracked separately for a chance to succeed?
If you're running a track program while its active. If you're analyzing it after they're gone, the analyzers are looking at the log files, which, if you turn off and delete, there are none. Ergo, no tracking.
Ravor
Umm, you ARE going to be noticed the moment your Agent Swarm starts changing the system loads by shutting down programs and IC, assuming that the system doesn't also send an alert once you delete the logs. Also I personally think it's silly not to be able to sever the connections/reboot the system from wherever your security center is, so no having to run downstairs to get to the power button either.

Oh also, wouldn't your Agent need to make an Edit action for each account it wanted to make?

*Edit*

A few minor changes for clarity.

*Edit 2.0*

QUOTE (knasser)
And once noticed, there are some really hard-hitting options that the defending node can take to deal with you. It's one of the few things that Ravor and I agree on, so it must be true.    wink.gif  smile.gif


Yup, tis scary when we agree isn't it? smokin.gif
Fortune
QUOTE (knasser)
I was talking about corporate networks, not commlinks. But as you asked for one, there you go.

Yeah I know, but thanks anyway. smile.gif

Not quite the killer defense that I was expecting though.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012